Performing Policy Scope while following Azure Managment Group best practices #739
Replies: 2 comments
-
In my experience /subscriptions/$subName doesn't work /subscriptions/$subID does work dev/test |
Beta Was this translation helpful? Give feedback.
-
for testing policies specifically, you'll want to create separate management groups which is contradictory to the general guidance, kind of. Anything that's not policy testing, I would follow the recommended general guidance, but it's hard/impossible to actually test policies without copying your prod environment to dev/test, which would be the management groups for policies. Us personally, we've got a separate tenant we use for testing, however it could be just as easily done with a separate intermediate root management group. Once done testing, clean up the resources, you don't HAVE to clean them up, but that's good practice. The missing whatif functionality hurts the ability to do this fully properly, but the fix should hopefully be pushed out next month as they roll out the changes starting on 6/30. |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
All,
I'm curious how to apply policies using a Dev/Test/Prod environment scope when following the Azure CAF recommended architecture of explicitly NOT defining a management group for landing zone sub-environments. Specifically, documented here:
The best way that I've currently thought of is to make use of notscopes and wildcards to exclude subscriptions matching a nonprod naming convention, however the scope requires a subscriptionID, not a subscription name, so I'm at a loss for how this would be implemented.
Beta Was this translation helpful? Give feedback.
All reactions